V
主页
京东 11.11 红包
eBPF Strengthens SR-IOV to Be Powerful - Weizhou Lan & Zhiying Fang, Daocloud
发布人
https://youtu.be/MA5wKZfWGPA
打开封面
下载高清视频
观看高清视频
视频下载器
bysyscall - Exploring Using eBPF to Bypass System Calls - Alan Maguire
Writing a Linux scheduler in Java with eBPF - Johannes Bechberger
Return to Sender - Detecting Kernel Exploits with eBPF
How Does eBPF Actually Work ?
Stories from BPF security auditing at Google – Brendan Jackman, Google
NSDI '24 - DINT- Fast In-Kernel Distributed Transactions with eBPF
KVM Forum 2022 - eBPF-based Extensible Paravirtualization
Unleashing VFIO's Potential- Code Refactoring
Observability when we have frame pointers (2024)
Navigating Transactions - ACID Complexity in Modern Databases
AI Hardware w- Jim Keller
Distributed Systems philosophy, fallacies and patterns for everyone
The elephants in the confidential room- Attestation and verification
Profiling data structures - Arnaldo Carvalho de Melo
Linux perf tool metrics - Ian Rogers
Container Observability with AWS | AWS Events
Beneath the Surface- Analyzing Nested CVM Performance on KVM-QEMU
Systemd & TPM in 2024
Results from using SCHED_DEADLINE for energy-aware optimization of RT DAGs on he
It's Time for Operating Systems to Rediscover Hardware (2021)
eBPF Kernel Scheduling with Ghost - Barret Rhoden
Mental models for modern program tuning
IEEE 802.1 Data Center Network Standard
Hardening Linux guest kernel for CC - Elena Reshetova
Submit a follow-up patch with b4
Run Node.js in a unikernel reliably (2024)
OSDI '20 - Wait-Free Code Patching of Multi-Threaded Processes
PostgreSQL - memory management internals
RASP - Protecting Applications Implemented in High-level Programming Lang
Coconut-SVSM- Early attestation to unlock persistent state
OSDI '24 - SquirrelFS- using the Rust compiler to check file-system crash consis
TPMs & The Linux Kernel- Unlocking A Better Path To Hardware Security
The Confidential Computing Story part I- Rivers, dams and kernel development by
SL[AUO]B- Kernel memory allocator design and philosophy
Secure bootloader for Confidential Computing - Ken Lu, Jiewen Yao
7 Keys That Make the Exceptional Distinct from the Good
SREcon22 APAC - Chaos Engineering at Scale
OVS 2022 Conference - Using OVS with P4 Coprocessor - Dan Daly
CXL and confidential computing - Jérôme Glisse
Intern Presentation- Speeding up kernel builds via automated header refactoring